cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
☆1,240Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.☆551Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,115Updated 7 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,084Updated 10 months ago
- Automating situational awareness for cloud penetration tests.☆2,123Updated 2 months ago
- ☆568Updated 2 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Updated 2 years ago
- 📚 A curated list of awesome Docker security resources☆676Updated 7 months ago
- Automated Red Team Infrastructure deployement using Docker☆1,243Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,029Updated this week
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆892Updated 2 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆997Updated last year
- A curated list of awesome CI CD security resources☆546Updated 7 months ago
- Best practices for segmentation of the corporate network of any company☆3,372Updated last year
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,186Updated 6 months ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆747Updated 3 years ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,859Updated 2 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆970Updated last year
- A DFIR tool written in Python.☆1,049Updated 3 years ago
- Real-time HTTP Intrusion Detection☆3,050Updated last year
- A Microservices-based framework for the study of Network Security and Penetration Test techniques☆594Updated 8 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,441Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,721Updated last year
- ContainerSSH: Launch containers on demand☆2,833Updated last month
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,419Updated 2 years ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,021Updated 2 weeks ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,774Updated 2 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,325Updated 2 weeks ago
- Checklist for container security - devsecops practices☆1,572Updated last year
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆399Updated 5 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,616Updated 2 weeks ago